Sciweavers

2108 search results - page 154 / 422
» Encrypted
Sort
View
142
Voted
TIT
2011
125views more  TIT 2011»
14 years 10 months ago
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
Abstract. In 1998, Blaze, Bleumer, and Strauss proposed a cryptographic primitive called proxy re-encryption, in which a proxy transforms – without seeing the corresponding plain...
Benoît Libert, Damien Vergnaud
SOICT
2010
14 years 10 months ago
Password recovery for encrypted ZIP archives using GPUs
Protecting data by passwords in documents such as DOC, PDF or RAR, ZIP archives has been demonstrated to be weak under dictionary attacks. Time for recovering the passwords of suc...
Pham Hong Phong, Phan Duc Dung, Duong Nhat Tan, Ng...
TISSEC
2010
79views more  TISSEC 2010»
14 years 10 months ago
Uncovering Spoken Phrases in Encrypted Voice over IP Conversations
Charles V. Wright, Lucas Ballard, Scott E. Coull, ...
129
Voted
TIT
2010
121views Education» more  TIT 2010»
14 years 10 months ago
Power of a public random permutation and its application to authenticated encryption
In this paper, we first show that many independent pseudorandom permutations over {0, 1}n can be obtained from a single public random permutation and secret n bits. We next prove ...
Kaoru Kurosawa
82
Voted
CORR
2011
Springer
155views Education» more  CORR 2011»
14 years 10 months ago
Image Encryption Based on Diffusion and Multiple Chaotic Maps
G. A. Sathishkumar, K. Bhoopathy bagan, N. Sriraam